Exam 8: CIW Network Technology Associate
Exam 1: CIW v5 Site Designer83 Questions
Exam 2: CIW E-Commerce Designer86 Questions
Exam 3: CIW v5 Database Design Specialist75 Questions
Exam 4: CIW v5 Security Essentials48 Questions
Exam 5: CIW Web Foundations Associate138 Questions
Exam 6: CIW Internet Business Associate14 Questions
Exam 7: CIW Site Development Associate15 Questions
Exam 8: CIW Network Technology Associate8 Questions
Exam 9: CIW User Interface Designer49 Questions
Exam 10: CIW JavaScript Specialist30 Questions
Select questions type
SuperBank is considering a cloud service from Local Data Center, Inc., to support the bank's expanding needs. SuperBank's managers are concerned about security. What can SuperBank request to protect its data from security threats?
Free
(Multiple Choice)
4.9/5
(27)
Correct Answer:
D
Patrick visits his teenage daughter's social media page and discovers several offensive posts about one of her classmates. After speaking with his daughter, Patrick learns that several other girls in her class are upset with the classmate and have been posting, texting and e-mailing others about the girl. What is the best way for Patrick to help his daughter understand cyber bullying?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
B
Lisa is traveling on company business. She has a company-issued smartphone with 4G access. Her hotel does not provide Internet access. What advantage does 4G provide to help her access the Internet?
(Multiple Choice)
4.9/5
(39)
Carlos is the Information Technology (IT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smartphones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smartphones for work. How can Carlos address the most significant security vulnerability?
(Multiple Choice)
4.7/5
(33)
You are a small-business owner and would like to encourage employees to bring their own devices (BYOD)to work. Which of the following can help reduce the security risks associated with a BYOD implementation?
(Multiple Choice)
4.8/5
(29)
Henry is the network manager at XYY Corporation, a large manufacturing company that competes in the global market. The company's computing environment is extremely complex and includes several proprietary software systems, all of which require custom configuration of network devices to operate correctly. The company's executive management team believes that they can benefit by switching the company over to any cloud-based service. Henry disagrees. What is a disadvantage of cloud-based services that Henry can cite to support his position?
(Multiple Choice)
4.9/5
(30)
You want to restrict host access to a wireless access point. What is the best way to do this?
(Multiple Choice)
4.7/5
(31)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)